US20130262314A1 - Encrypted payment image - Google Patents
Encrypted payment image Download PDFInfo
- Publication number
- US20130262314A1 US20130262314A1 US13/434,938 US201213434938A US2013262314A1 US 20130262314 A1 US20130262314 A1 US 20130262314A1 US 201213434938 A US201213434938 A US 201213434938A US 2013262314 A1 US2013262314 A1 US 2013262314A1
- Authority
- US
- United States
- Prior art keywords
- image
- invoice
- computing device
- payment
- display
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/047—Payment circuits using payment protocols involving electronic receipts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3274—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G5/00—Receipt-giving machines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- a purchaser may authorize and authenticate a payment invoice to make a purchase at a retail location.
- a retailer may provide a paper or digital receipt, and a purchaser may sign to indicate that the purchase is authorized and that the purchaser is authorized to use the selected payment method.
- FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase.
- FIG. 2 is a block diagram illustrating one example of a mobile computing device to encrypt a payment image.
- FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image.
- FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image.
- FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device.
- a retailer may request a signed receipt or invoice for a purchase as proof to a payment entity, such as bank or credit card company, that an authenticated purchaser authorized the purchase.
- a purchaser may authorize and authenticate a purchase using a mobile device, such as a mobile device with a camera and display, by cryptographically signing an image of an invoice with payment account information.
- a mobile device may capture an image of an invoice displayed on a retail computing device.
- the mobile device may create a binary version of the image and encrypt the binary version with a secret key.
- the secret key may be the purchaser's account number such that the secret key is also known by the payment entity with whom the account is held.
- the mobile device may create a payment image from the encrypted binary and display the image.
- the purchaser may scan the displayed payment image to a retail computing device using a scanner associated with the retailer, and the retailer may transmit the payment image of the encrypted binary version of the image to the payment entity to receive payment.
- the payment entity may decrypt a binary version of the payment image using the account number key.
- the decrypted binary may include the invoice information, such as the total amount due for payment, and the payment entity may issue payment based on the invoice information.
- Making a purchase using an encrypted payment image may allow a mobile device without internet access that includes a camera and display to authorize and authenticate a purchase.
- the image may be used to capture more transaction and encryption details that may be feasibly entered manually.
- Paying with a digitally signed invoice may allow the retailer to receive payment without accessing a purchaser's account information, which may protect the purchaser in the event that the retailer is hacked or in cases where the retailer is an untrustworthy merchant.
- a cryptographically signed invoice allows a payment entity to view invoice details after decrypting the signed invoice. The payment entity may use the invoice details, such as date and location of purchase, to prevent incorrect charges and duplicate charges.
- a transaction between computing devices may decrease the use of paper receipts.
- FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase.
- a mobile computing device 100 may make a purchase from a retail computing device 101 using a payment account issued by a payment entity associated with a payment computing device 102 .
- the mobile computing device 100 may be a tablet, mobile phone, or music player, and a user may bring the mobile computing device 100 to a retail location.
- the mobile computing device 100 may or may not have network access.
- the mobile computing device 100 is described in more detail in FIG. 2 .
- the retail computing device 101 may be a computing device at a retail location for allowing a user to make a purchase.
- the retail computing device 101 may be a kiosk that allows a user to scan an item for purchase, determines the item and total, and allows the user to pay for the item.
- the retail computing device 101 may be a self-scanning lane in a retail location. In some cases, the purchase may be made outside of a retail setting, such as where a purchase is made from an individual.
- the retail computing device 101 may be a personal computing device, such as a tablet, laptop, or mobile computing device communicating with a purchaser's device. The retail computing device 101 is described in more detail in FIG. 3 .
- the payment computing device 102 may be a computing device associated with a payment entity, such as a credit card company or bank, that processes a payment. For example, the payment computing device 102 may verify a user account number and pay the retailer from the user account.
- a payment entity such as a credit card company or bank
- the mobile computing device 100 , retail computing device 101 , and payment computing device 102 may communicate to allow a purchase to be made from the mobile computing device 100 .
- the retail computing device 101 may create an invoice including transaction information.
- the retail computing device 101 may display the invoice such that a camera on the mobile computing device 100 captures an image of the invoice.
- the invoice is displayed as a barcode.
- the invoice may be a sequence of barcodes.
- the mobile computing device 100 may create a binary version of the invoice and digitally sign the invoice with a secret key associated with a payment account.
- the mobile computing device 100 may display an image of the cryptographically signed invoice, and a user may scan the image to the retail computing device 101 .
- the mobile computing device 100 may format the cryptographically signed image for display, such as by creating a barcode or sequence of barcodes of the cryptographically signed image binary.
- the mobile computing device 100 may cryptographically sign the image using an encryption key. For example, hash-based message authentication (HMAC) or public key infrastructure encryption may be used.
- HMAC hash-based message authentication
- public key infrastructure encryption may be used.
- the retail computing device 101 may transmit the signed invoice to the payment computing device 102 .
- the payment computing device 102 may decrypt the signed version of the invoice using the secret key and provide payment to the retailer from the user's account.
- the retail computing device 101 creates a barcode of an invoice to display as the invoice image.
- FIG. 2 is a block diagram illustrating one example of the mobile computing device 100 to encrypt a payment image.
- the mobile computing device 100 from FIG. 1 may be used to create a cryptographically signed invoice image to be uploaded to the retailer computing device 101 as payment for a purchase from the retailer associated with the retail computing device 101 .
- the mobile computing device 100 may include a processor 201 , a machine-readable storage medium 202 , a display 203 , and a camera 204 .
- the display 203 may be a screen included within the mobile computing device 100 .
- the display 203 may be a mobile phone screen.
- the display 203 may be used to output information.
- the display 203 may receive user input, such as through touch or gestures relative to the display 203 .
- the camera 204 may be included within the mobile computing device 100 .
- the camera 204 may capture pictures from the mobile computing device 100 to be displayed on the display 203 .
- the view of the camera is shown on the display 203 as a user captures a picture.
- the processor 201 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions.
- the mobile computing device 100 includes logic instead of or in addition to the processor 201 .
- the processor 201 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below.
- the retail computing device 100 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality.
- the machine-readable storage medium 202 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.).
- the machine-readable storage medium 202 may be, for example, a computer readable non-transitory medium.
- the machine-readable storage medium 202 may include payment information 207 .
- the payment information 207 may be information used to encrypt an invoice.
- the payment information 207 may include an encryption key that is a secret key also known by a financial entity associated with payment information.
- the financial entity may use the payment information to decrypt information encrypted by the mobile computing device 100 .
- a user may store the payment information 207 to be saved for future purchases or a user may enter and store the payment information 207 when a purchase is made.
- the payment information 207 includes multiple encryption keys where each key is associated with a different account.
- the mobile computing device 100 may generate a user interface to allow a user to select which account to use for a purchase.
- the payment information 207 may include account information and an associated encryption key.
- the payment information 207 may include information about a payment entity associated with the encryption key such that the information may be displayed to a user to allow the user to select an account for payment.
- the machine-readable storage medium 202 may include instructions executable by the processor 201 .
- the machine-readable storage 202 may include authentication instructions 205 and authorization instructions 206 .
- the payment information 207 , authentication instructions 205 , and authorization instructions 206 may be stored in the same or separate storages.
- the authentication instructions 205 may include instructions to authenticate an invoice by encrypting a binary version of an invoice using the payment information 207 .
- the mobile computing device 100 may receive an image of an invoice and determine a binary version of the invoice image.
- the mobile computing device 100 may cryptographically sign the invoice image with an encryption key stored in the payment information 207 .
- the authorization instructions 206 may include instructions to authorize the invoice by displaying the authenticated invoice on the display 203 to be provided to a retailer. For example, an image of the encrypted invoice image may be displayed on the display 203 to provide it to a retailer. The cryptographically signed invoice image may indicate that the user authorizes the particular purchase details described in the invoice. The retail computing device 101 may capture an image of the display 203 to receive the authorized invoice.
- FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image.
- the retail computing device 101 from FIG. 1 may process payment information received from the mobile computing device 100 .
- the retail computing device 101 may send transaction information to mobile computing device 100 and transmit payment information received from the mobile computing device 100 to a payment entity computing device, such as payment computing device 102 .
- the retail computing device 102 may include a processor 301 , a machine-readable storage medium 302 , a display 303 , a scanner 304 , and a network interface 305 .
- the display 303 may be a display to show transaction information to a user.
- the display 303 may display information about items purchased and payment totals.
- the display 303 may display an invoice related to a user's purchase.
- the scanner 304 may be used to scan items for purchase. For example, a user may scan the barcode of an item to be purchased. In one implementation, the scanner 304 may scan a cryptographically signed payment image from a user's mobile device, such as the mobile computing device 100 .
- the network interface 305 may allow the retail computing device 101 to communicate via a network, such as the Internet.
- the retail computing device 102 may communicate with a payment entity, such as with payment computing device 102 , to receive payment for a transaction.
- the processor 301 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions.
- the retail computing device 101 includes logic instead of or in addition to the processor 301 .
- the processor 301 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below.
- the retail computing device 101 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality.
- the machine-readable storage medium 302 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.).
- the machine-readable storage medium 302 may be, for example, a computer readable non-transitory medium.
- the machine-readable storage medium 302 may include instructions executable by the processor 301 .
- the machine-readable storage medium 302 may include invoice display instructions 306 and payment image transmission instructions 307 .
- the invoice display instructions 306 may include instructions to display invoice information on the display 303 .
- the invoice display instructions 306 include instructions to create an invoice in a particular image format readable by the mobile computing device 100 .
- the invoice display instructions 306 include instructions to encode invoice information in a barcode to be displayed on the display 303 .
- the invoice display instructions 306 may include instructions to encode the invoice information in a halftone image, such as in a steganographic halftone image.
- the mobile computing device 100 may capture an image of the display 303 of the invoice image.
- the payment image transmission instructions 307 may include instructions to transmit payment information received from an image scanned by the scanner 304 to the payment computing device 102 via the network interface 304 .
- a user may use the scanner 304 to scan the display 203 of the mobile computing device 100 .
- the display 203 may display an image of a cryptographically signed version of the invoice image provided by the retail computing device 101 .
- the retail computing device 101 may transmit the scanned image to the payment computing device 102 .
- the retail computing device 101 may decode or format the scanned image prior to transmitting it to the payment computing device 102 .
- the retail computing device 101 extracts information from the cryptographically signed image and transmits the extracted information to the payment computing device 102 .
- the retail computing device 101 may decode a barcode and send the decoded information to the payment computing device 102 or the retail computing device 101 may use optical character recognition to interpret the characters of the cryptographically signed image and transmit the character values to the payment computing device 102 .
- the retail computing device 101 may determine a binary version of the cryptographically signed image and transmit the binary version to the payment computing device 102 .
- FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image.
- a mobile computing device such as the mobile computing device 100 , may create an encrypted payment image to authenticate a purchase and provide the encrypted payment to a retail computing device to authorize a purchase.
- the mobile computing device may cryptographically sign a binary version of an invoice image to provide payment information and authentication.
- the method may be performed, for example, by the processor 201 of FIG. 1 .
- a mobile computing device determines a binary version of an invoice image.
- the invoice image may be an image for displaying transaction information.
- the invoice may include information, such as payment total, items purchased, the retail entity name, purchaser name, and time of purchase.
- the mobile computing device may receive the invoice image from a retailer.
- the mobile computing device receives the invoice via RFID or Bluetooth.
- a retailer displays the image invoice, and the mobile computing device captures an image of the invoice image.
- a user may use a camera of the mobile computing device to capture the image of the invoice image displayed by the retail computing device.
- the mobile computing device displays the invoice information. For example, a user may view the invoice information prior to authorizing the purchase.
- the mobile computing device may parse or decode the invoice image and display the transaction information to a user.
- the mobile computing device may capture an image of a barcode invoice image.
- the mobile computing device may decode the barcode to determine the invoice information and display the invoice information.
- the mobile computing device may generate a user interface allow the user to confirm the transaction details.
- the user interface may allow a user to select to proceed with the transaction after viewing the transaction details. Displaying the details to the user may prevent a retailer from creating a non-human readable invoice image that includes incorrect purchase information.
- the user may view the invoice details to provide authorization to the particular transaction details included in the invoice image.
- the mobile computing device may determine the binary version of the invoice image.
- the invoice image may be any suitable type of digital image.
- the mobile computing device alters the image prior to determining the binary version.
- the invoice image may be encoded or formatted in a particular manner readable by the mobile computing device.
- the image may be a barcode image, a text image, or a steganographic halftone image of transaction information.
- the image is displayed in a manner that the mobile computing device may decipher the contents using optical character recognition.
- the mobile computing device may determine the ASCII binary of the text displayed in the invoice image.
- the invoice image is a steganographic halftone image.
- the invoice information image may be encoded by the placement of the pixels in the halftone image such that it may appear to be a solid color to the human eye.
- the ASCII binary of the steganographic halftone image may be determined from the image without the use optical character recognition. For example, the retailer may display or print the binary version of the halftone image.
- the mobile computing device signs the binary version of the invoice image cryptographically with payment account information.
- the mobile computing device may encrypt the binary version of the invoice image using a secret cryptographic key.
- the secret cryptographic key may be a shared secret key with a payment entity that is not shared with the retailer.
- the mobile computing device may encrypt the binary using a hash-based message authentication code (HMAC).
- HMAC hash-based message authentication code
- the binary of the invoice image may be encrypted using a cryptographic hash function and a secret key where the secret key relates to payment information shared with the payment entity.
- the secret key may be an account number, such as a credit card number, of an account held with the payment entity.
- the mobile computing device may use public key infrastructure (PKI) encryption and a certificate authority to allow the mobile computing device to encrypt the invoice image in a manner that may be decrypted by a payment entity but not by a retailer.
- PKI public key infrastructure
- the invoice image binary may be encrypted such that the details provided in the invoice image represent the transaction details authorized by the user.
- the mobile computing device displays an image of the cryptographically signed binary.
- the mobile computing device may display an image of the cryptographically signed binary to provide the signed version of the invoice image back to the retailer.
- the image may be displayed on a display associated with the mobile computing device in a manner that allows the image to be scanned by a scanner associated with a retail computing device.
- the displayed image may be any suitable type of digital image.
- the mobile computing device formats the cryptographically signed binary prior to displaying it. For example, the mobile computing device may format the cryptographically signed binary as a barcode image.
- the mobile computing device formats the cryptographically signed binary as a halftone image, such as a steganographic halftone image.
- a retail computing device may capture a payment image of the cryptographically signed binary displayed on the mobile device.
- the retail computing device may capture the image through a camera or scanner.
- a user may hold the mobile phone up to a scanner to allow the retail computing device to capture the image.
- the invoice image may be cryptographically signed in a manner that the retail computing device may decrypt it to verify the purchaser.
- the invoice image may be cryptographically signed in a manner that the retailer is unable to decrypt it, and the retailer may send the cryptographically signed version of the invoice to a payment entity without verifying its content.
- the retail computing device may process the payment image to extract information to transmit to a payment computing device.
- the retail computing device may use optical character recognition to determine the text content of the image.
- the payment image is in the form of a barcode.
- the retail computing device may decode the barcode image to determine a string of text and transmits the string of text to the payment computing device.
- the retail computing device may transmit the image to the payment computing device without evaluating the payment image, and the payment computing device may perform additional processing.
- the retail computing device may send an image of text without performing optical character recognition methods, and the payment computing device may perform an optical character recognition method to interpret the image.
- the retail computing device transmits additional information to the payment computing device.
- the retail computing device may transmit a customer name or identifier with the payment image such that the payment computing device may determine the decryption key associated with the particular customer.
- the retail computing device may send another version of the invoice such that the payment computing device may compare the invoice received from the retailer and the encrypted version from the mobile computing device to determine that the purchase information is compatible.
- the payment computing device may decrypt the cryptographically signed invoice image.
- the successful decryption may indicate that the payment is authenticated.
- the payment computing device may determine the authorized payment amount from the decrypted invoice.
- the payment computing device may issue the determined payment amount to the retailer from an account associated with the particular customer or decryption key.
- FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device.
- the mobile computing device 500 and the retail computing device 501 may communicate payment information through a series of barcode images.
- items are scanned for purchase. For example, a user may scan the barcodes of items to be purchased with a scanner associated with the retail computing device 501 .
- the retail computing device 501 may create an invoice of the transaction.
- the invoice may include the date, location, and contents of the purchase.
- the retail computing device 501 may encode the invoice in a barcode format.
- the retail computing device 501 displays the barcode of the invoice on a display associated with the retail computing device 501 .
- the mobile computing device 500 takes a picture of the barcode invoice displayed by the retail computing device 501 .
- the mobile computing device 500 determines a binary version of the barcode image captured by the mobile computing device 500 .
- the mobile computing device 500 cryptographically signs the binary version of the invoice barcode image. The image may be signed using information related to a payment account as the cryptographic key.
- the mobile computing device 500 generates a barcode image of the cryptographically signed image.
- the mobile computing device 500 displays the barcode of the cryptographically signed image on a display associated with the mobile computing device 500 .
- the retail computing device 501 scans the barcode.
- a user may use a scanner associated with the retail computing device 501 to scan the barcode displayed on the mobile computing device 500 .
- the retail computing device 501 transmits information about the barcode to a payment entity.
- the payment entity may decrypt the image binary and provide payment to the retailer for the transaction in the amount included on the cryptographically signed invoice.
Abstract
Description
- A purchaser may authorize and authenticate a payment invoice to make a purchase at a retail location. For example, a retailer may provide a paper or digital receipt, and a purchaser may sign to indicate that the purchase is authorized and that the purchaser is authorized to use the selected payment method.
- The drawings describe example embodiments. The following detailed description references the drawings, wherein:
-
FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase. -
FIG. 2 is a block diagram illustrating one example of a mobile computing device to encrypt a payment image. -
FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image. -
FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image. -
FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device. - A retailer may request a signed receipt or invoice for a purchase as proof to a payment entity, such as bank or credit card company, that an authenticated purchaser authorized the purchase. In one implementation, a purchaser may authorize and authenticate a purchase using a mobile device, such as a mobile device with a camera and display, by cryptographically signing an image of an invoice with payment account information.
- As an example, a mobile device may capture an image of an invoice displayed on a retail computing device. The mobile device may create a binary version of the image and encrypt the binary version with a secret key. The secret key may be the purchaser's account number such that the secret key is also known by the payment entity with whom the account is held. The mobile device may create a payment image from the encrypted binary and display the image. The purchaser may scan the displayed payment image to a retail computing device using a scanner associated with the retailer, and the retailer may transmit the payment image of the encrypted binary version of the image to the payment entity to receive payment. The payment entity may decrypt a binary version of the payment image using the account number key. The decrypted binary may include the invoice information, such as the total amount due for payment, and the payment entity may issue payment based on the invoice information.
- Making a purchase using an encrypted payment image may allow a mobile device without internet access that includes a camera and display to authorize and authenticate a purchase. The image may be used to capture more transaction and encryption details that may be feasibly entered manually. Paying with a digitally signed invoice may allow the retailer to receive payment without accessing a purchaser's account information, which may protect the purchaser in the event that the retailer is hacked or in cases where the retailer is an untrustworthy merchant. A cryptographically signed invoice allows a payment entity to view invoice details after decrypting the signed invoice. The payment entity may use the invoice details, such as date and location of purchase, to prevent incorrect charges and duplicate charges. A transaction between computing devices may decrease the use of paper receipts.
-
FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase. For example, amobile computing device 100 may make a purchase from aretail computing device 101 using a payment account issued by a payment entity associated with apayment computing device 102. - The
mobile computing device 100 may be a tablet, mobile phone, or music player, and a user may bring themobile computing device 100 to a retail location. Themobile computing device 100 may or may not have network access. Themobile computing device 100 is described in more detail inFIG. 2 . - The
retail computing device 101 may be a computing device at a retail location for allowing a user to make a purchase. For example, theretail computing device 101 may be a kiosk that allows a user to scan an item for purchase, determines the item and total, and allows the user to pay for the item. Theretail computing device 101 may be a self-scanning lane in a retail location. In some cases, the purchase may be made outside of a retail setting, such as where a purchase is made from an individual. For example, theretail computing device 101 may be a personal computing device, such as a tablet, laptop, or mobile computing device communicating with a purchaser's device. Theretail computing device 101 is described in more detail inFIG. 3 . - The
payment computing device 102 may be a computing device associated with a payment entity, such as a credit card company or bank, that processes a payment. For example, thepayment computing device 102 may verify a user account number and pay the retailer from the user account. - The
mobile computing device 100,retail computing device 101, andpayment computing device 102 may communicate to allow a purchase to be made from themobile computing device 100. For example, theretail computing device 101 may create an invoice including transaction information. Theretail computing device 101 may display the invoice such that a camera on themobile computing device 100 captures an image of the invoice. In one implementation, the invoice is displayed as a barcode. The invoice may be a sequence of barcodes. Themobile computing device 100 may create a binary version of the invoice and digitally sign the invoice with a secret key associated with a payment account. Themobile computing device 100 may display an image of the cryptographically signed invoice, and a user may scan the image to theretail computing device 101. Themobile computing device 100 may format the cryptographically signed image for display, such as by creating a barcode or sequence of barcodes of the cryptographically signed image binary. Themobile computing device 100 may cryptographically sign the image using an encryption key. For example, hash-based message authentication (HMAC) or public key infrastructure encryption may be used. - The
retail computing device 101 may transmit the signed invoice to thepayment computing device 102. Thepayment computing device 102 may decrypt the signed version of the invoice using the secret key and provide payment to the retailer from the user's account. In one implementation, theretail computing device 101 creates a barcode of an invoice to display as the invoice image. -
FIG. 2 is a block diagram illustrating one example of themobile computing device 100 to encrypt a payment image. For example, themobile computing device 100 fromFIG. 1 may be used to create a cryptographically signed invoice image to be uploaded to theretailer computing device 101 as payment for a purchase from the retailer associated with theretail computing device 101. Themobile computing device 100 may include aprocessor 201, a machine-readable storage medium 202, adisplay 203, and acamera 204. - The
display 203 may be a screen included within themobile computing device 100. For example, thedisplay 203 may be a mobile phone screen. Thedisplay 203 may be used to output information. In some implementations, thedisplay 203 may receive user input, such as through touch or gestures relative to thedisplay 203. - The
camera 204 may be included within themobile computing device 100. For example, thecamera 204 may capture pictures from themobile computing device 100 to be displayed on thedisplay 203. In one implementation, the view of the camera is shown on thedisplay 203 as a user captures a picture. - The
processor 201 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions. In one embodiment, themobile computing device 100 includes logic instead of or in addition to theprocessor 201. As an alternative or in addition to fetching, decoding, and executing instructions, theprocessor 201 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below. In one implementation, theretail computing device 100 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality. - The machine-
readable storage medium 202 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.). The machine-readable storage medium 202 may be, for example, a computer readable non-transitory medium. - The machine-
readable storage medium 202 may includepayment information 207. Thepayment information 207 may be information used to encrypt an invoice. For example, thepayment information 207 may include an encryption key that is a secret key also known by a financial entity associated with payment information. The financial entity may use the payment information to decrypt information encrypted by themobile computing device 100. A user may store thepayment information 207 to be saved for future purchases or a user may enter and store thepayment information 207 when a purchase is made. In one implementation, thepayment information 207 includes multiple encryption keys where each key is associated with a different account. Themobile computing device 100 may generate a user interface to allow a user to select which account to use for a purchase. Thepayment information 207 may include account information and an associated encryption key. For example, thepayment information 207 may include information about a payment entity associated with the encryption key such that the information may be displayed to a user to allow the user to select an account for payment. - The machine-
readable storage medium 202 may include instructions executable by theprocessor 201. For example, the machine-readable storage 202 may includeauthentication instructions 205 andauthorization instructions 206. Thepayment information 207,authentication instructions 205, andauthorization instructions 206 may be stored in the same or separate storages. - The
authentication instructions 205 may include instructions to authenticate an invoice by encrypting a binary version of an invoice using thepayment information 207. For example, themobile computing device 100 may receive an image of an invoice and determine a binary version of the invoice image. Themobile computing device 100 may cryptographically sign the invoice image with an encryption key stored in thepayment information 207. - The
authorization instructions 206 may include instructions to authorize the invoice by displaying the authenticated invoice on thedisplay 203 to be provided to a retailer. For example, an image of the encrypted invoice image may be displayed on thedisplay 203 to provide it to a retailer. The cryptographically signed invoice image may indicate that the user authorizes the particular purchase details described in the invoice. Theretail computing device 101 may capture an image of thedisplay 203 to receive the authorized invoice. -
FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image. For example, theretail computing device 101 fromFIG. 1 may process payment information received from themobile computing device 100. Theretail computing device 101 may send transaction information tomobile computing device 100 and transmit payment information received from themobile computing device 100 to a payment entity computing device, such aspayment computing device 102. Theretail computing device 102 may include aprocessor 301, a machine-readable storage medium 302, adisplay 303, ascanner 304, and anetwork interface 305. - The
display 303 may be a display to show transaction information to a user. For example, thedisplay 303 may display information about items purchased and payment totals. Thedisplay 303 may display an invoice related to a user's purchase. - The
scanner 304 may be used to scan items for purchase. For example, a user may scan the barcode of an item to be purchased. In one implementation, thescanner 304 may scan a cryptographically signed payment image from a user's mobile device, such as themobile computing device 100. - The
network interface 305 may allow theretail computing device 101 to communicate via a network, such as the Internet. For example, theretail computing device 102 may communicate with a payment entity, such as withpayment computing device 102, to receive payment for a transaction. - The
processor 301 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions. In one embodiment, theretail computing device 101 includes logic instead of or in addition to theprocessor 301. As an alternative or in addition to fetching, decoding, and executing instructions, theprocessor 301 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below. In one implementation, theretail computing device 101 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality. - The machine-
readable storage medium 302 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.). The machine-readable storage medium 302 may be, for example, a computer readable non-transitory medium. - The machine-
readable storage medium 302 may include instructions executable by theprocessor 301. For example, the machine-readable storage medium 302 may includeinvoice display instructions 306 and paymentimage transmission instructions 307. - The
invoice display instructions 306 may include instructions to display invoice information on thedisplay 303. In one implementation, theinvoice display instructions 306 include instructions to create an invoice in a particular image format readable by themobile computing device 100. For example, theinvoice display instructions 306 include instructions to encode invoice information in a barcode to be displayed on thedisplay 303. Theinvoice display instructions 306 may include instructions to encode the invoice information in a halftone image, such as in a steganographic halftone image. Themobile computing device 100 may capture an image of thedisplay 303 of the invoice image. - The payment
image transmission instructions 307 may include instructions to transmit payment information received from an image scanned by thescanner 304 to thepayment computing device 102 via thenetwork interface 304. For example, a user may use thescanner 304 to scan thedisplay 203 of themobile computing device 100. Thedisplay 203 may display an image of a cryptographically signed version of the invoice image provided by theretail computing device 101. Theretail computing device 101 may transmit the scanned image to thepayment computing device 102. - The
retail computing device 101 may decode or format the scanned image prior to transmitting it to thepayment computing device 102. In one implementation, theretail computing device 101 extracts information from the cryptographically signed image and transmits the extracted information to thepayment computing device 102. For example, theretail computing device 101 may decode a barcode and send the decoded information to thepayment computing device 102 or theretail computing device 101 may use optical character recognition to interpret the characters of the cryptographically signed image and transmit the character values to thepayment computing device 102. Theretail computing device 101 may determine a binary version of the cryptographically signed image and transmit the binary version to thepayment computing device 102. -
FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image. A mobile computing device, such as themobile computing device 100, may create an encrypted payment image to authenticate a purchase and provide the encrypted payment to a retail computing device to authorize a purchase. The mobile computing device may cryptographically sign a binary version of an invoice image to provide payment information and authentication. The method may be performed, for example, by theprocessor 201 ofFIG. 1 . - Beginning at 400, a mobile computing device, such as the
mobile computing device 100, determines a binary version of an invoice image. The invoice image may be an image for displaying transaction information. The invoice may include information, such as payment total, items purchased, the retail entity name, purchaser name, and time of purchase. - The mobile computing device may receive the invoice image from a retailer. In one implementation, the mobile computing device receives the invoice via RFID or Bluetooth. In one implementation, a retailer displays the image invoice, and the mobile computing device captures an image of the invoice image. For example, a user may use a camera of the mobile computing device to capture the image of the invoice image displayed by the retail computing device.
- In one implementation, the mobile computing device displays the invoice information. For example, a user may view the invoice information prior to authorizing the purchase. The mobile computing device may parse or decode the invoice image and display the transaction information to a user. As an example, the mobile computing device may capture an image of a barcode invoice image. The mobile computing device may decode the barcode to determine the invoice information and display the invoice information.
- The mobile computing device may generate a user interface allow the user to confirm the transaction details. For example, the user interface may allow a user to select to proceed with the transaction after viewing the transaction details. Displaying the details to the user may prevent a retailer from creating a non-human readable invoice image that includes incorrect purchase information. The user may view the invoice details to provide authorization to the particular transaction details included in the invoice image.
- The mobile computing device may determine the binary version of the invoice image. The invoice image may be any suitable type of digital image. In one implementation, the mobile computing device alters the image prior to determining the binary version. The invoice image may be encoded or formatted in a particular manner readable by the mobile computing device. For example, the image may be a barcode image, a text image, or a steganographic halftone image of transaction information. In one implementation, the image is displayed in a manner that the mobile computing device may decipher the contents using optical character recognition. For example, the mobile computing device may determine the ASCII binary of the text displayed in the invoice image. In one implementation, the invoice image is a steganographic halftone image. The invoice information image may be encoded by the placement of the pixels in the halftone image such that it may appear to be a solid color to the human eye. The ASCII binary of the steganographic halftone image may be determined from the image without the use optical character recognition. For example, the retailer may display or print the binary version of the halftone image.
- Continuing to 401, the mobile computing device signs the binary version of the invoice image cryptographically with payment account information. For example, the mobile computing device may encrypt the binary version of the invoice image using a secret cryptographic key. The secret cryptographic key may be a shared secret key with a payment entity that is not shared with the retailer. The mobile computing device may encrypt the binary using a hash-based message authentication code (HMAC). For example, the binary of the invoice image may be encrypted using a cryptographic hash function and a secret key where the secret key relates to payment information shared with the payment entity. The secret key may be an account number, such as a credit card number, of an account held with the payment entity. In one implementation, the mobile computing device may use public key infrastructure (PKI) encryption and a certificate authority to allow the mobile computing device to encrypt the invoice image in a manner that may be decrypted by a payment entity but not by a retailer. The invoice image binary may be encrypted such that the details provided in the invoice image represent the transaction details authorized by the user.
- Proceeding to 402, the mobile computing device displays an image of the cryptographically signed binary. The mobile computing device may display an image of the cryptographically signed binary to provide the signed version of the invoice image back to the retailer. The image may be displayed on a display associated with the mobile computing device in a manner that allows the image to be scanned by a scanner associated with a retail computing device. The displayed image may be any suitable type of digital image. In one implementation, the mobile computing device formats the cryptographically signed binary prior to displaying it. For example, the mobile computing device may format the cryptographically signed binary as a barcode image. In one implementation, the mobile computing device formats the cryptographically signed binary as a halftone image, such as a steganographic halftone image.
- A retail computing device may capture a payment image of the cryptographically signed binary displayed on the mobile device. The retail computing device may capture the image through a camera or scanner. A user may hold the mobile phone up to a scanner to allow the retail computing device to capture the image. In some implementations, the invoice image may be cryptographically signed in a manner that the retail computing device may decrypt it to verify the purchaser. In some implementations, the invoice image may be cryptographically signed in a manner that the retailer is unable to decrypt it, and the retailer may send the cryptographically signed version of the invoice to a payment entity without verifying its content.
- The retail computing device may process the payment image to extract information to transmit to a payment computing device. For example, the retail computing device may use optical character recognition to determine the text content of the image. In one implementation, the payment image is in the form of a barcode. The retail computing device may decode the barcode image to determine a string of text and transmits the string of text to the payment computing device. The retail computing device may transmit the image to the payment computing device without evaluating the payment image, and the payment computing device may perform additional processing. For example, the retail computing device may send an image of text without performing optical character recognition methods, and the payment computing device may perform an optical character recognition method to interpret the image.
- In one implementation, the retail computing device transmits additional information to the payment computing device. For example, the retail computing device may transmit a customer name or identifier with the payment image such that the payment computing device may determine the decryption key associated with the particular customer. The retail computing device may send another version of the invoice such that the payment computing device may compare the invoice received from the retailer and the encrypted version from the mobile computing device to determine that the purchase information is compatible.
- The payment computing device may decrypt the cryptographically signed invoice image. The successful decryption may indicate that the payment is authenticated. The payment computing device may determine the authorized payment amount from the decrypted invoice. The payment computing device may issue the determined payment amount to the retailer from an account associated with the particular customer or decryption key.
-
FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device. Themobile computing device 500 and theretail computing device 501 may communicate payment information through a series of barcode images. At 502, items are scanned for purchase. For example, a user may scan the barcodes of items to be purchased with a scanner associated with theretail computing device 501. Theretail computing device 501 may create an invoice of the transaction. The invoice may include the date, location, and contents of the purchase. Theretail computing device 501 may encode the invoice in a barcode format. At 503, theretail computing device 501 displays the barcode of the invoice on a display associated with theretail computing device 501. - At 504, the
mobile computing device 500 takes a picture of the barcode invoice displayed by theretail computing device 501. At 505, themobile computing device 500 determines a binary version of the barcode image captured by themobile computing device 500. At 506, themobile computing device 500 cryptographically signs the binary version of the invoice barcode image. The image may be signed using information related to a payment account as the cryptographic key. At 507, themobile computing device 500 generates a barcode image of the cryptographically signed image. At 580, themobile computing device 500 displays the barcode of the cryptographically signed image on a display associated with themobile computing device 500. - At 509, the
retail computing device 501 scans the barcode. A user may use a scanner associated with theretail computing device 501 to scan the barcode displayed on themobile computing device 500. At 511, theretail computing device 501 transmits information about the barcode to a payment entity. The payment entity may decrypt the image binary and provide payment to the retailer for the transaction in the amount included on the cryptographically signed invoice.
Claims (15)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/434,938 US10453105B2 (en) | 2012-03-30 | 2012-03-30 | Encrypted payment image |
US16/558,795 US20200051144A1 (en) | 2012-03-30 | 2019-09-03 | Encrypted payment image |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/434,938 US10453105B2 (en) | 2012-03-30 | 2012-03-30 | Encrypted payment image |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/558,795 Division US20200051144A1 (en) | 2012-03-30 | 2019-09-03 | Encrypted payment image |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130262314A1 true US20130262314A1 (en) | 2013-10-03 |
US10453105B2 US10453105B2 (en) | 2019-10-22 |
Family
ID=49236351
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/434,938 Active 2035-03-11 US10453105B2 (en) | 2012-03-30 | 2012-03-30 | Encrypted payment image |
US16/558,795 Abandoned US20200051144A1 (en) | 2012-03-30 | 2019-09-03 | Encrypted payment image |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/558,795 Abandoned US20200051144A1 (en) | 2012-03-30 | 2019-09-03 | Encrypted payment image |
Country Status (1)
Country | Link |
---|---|
US (2) | US10453105B2 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140136418A1 (en) * | 2011-09-29 | 2014-05-15 | Pacid Technologies, Llc | System and method for application security |
US20150100668A1 (en) * | 2013-10-04 | 2015-04-09 | Samsung Electronics Co., Ltd. | Method and apparatus for content verification |
US20150104006A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Methods, systems, and devices for handling image capture devices and captured images |
US20150348033A1 (en) * | 2012-12-21 | 2015-12-03 | Leon Johannes Brits | Secure Payments Using Portable Communication Devices and Two Dimensional Codes |
US9558680B2 (en) | 2014-04-04 | 2017-01-31 | Sizhe Tan | Payload in picture encoding |
EP3108425A4 (en) * | 2014-02-21 | 2017-10-18 | Visa International Service Association | System and method for transmitting and receiving transaction information |
US9799036B2 (en) | 2013-10-10 | 2017-10-24 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy indicators |
US10102543B2 (en) | 2013-10-10 | 2018-10-16 | Elwha Llc | Methods, systems, and devices for handling inserted data into captured images |
US10185841B2 (en) | 2013-10-10 | 2019-01-22 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy beacons |
US10346624B2 (en) | 2013-10-10 | 2019-07-09 | Elwha Llc | Methods, systems, and devices for obscuring entities depicted in captured images |
US10410196B1 (en) * | 2013-11-29 | 2019-09-10 | Intuit Inc. | System and method to enable payment using mark generation and mobile device |
US10834290B2 (en) | 2013-10-10 | 2020-11-10 | Elwha Llc | Methods, systems, and devices for delivering image data from captured images to devices |
US11132674B2 (en) | 2015-03-04 | 2021-09-28 | Sizhe Tan | Micro trusted network |
US20210377309A1 (en) * | 2020-06-02 | 2021-12-02 | Hid Global Cid Sas | System and method for establishing secure session with online disambiguation data |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11062297B2 (en) * | 2018-10-29 | 2021-07-13 | 7-Eleven, Inc. | Validation using key pairs and interprocess communications |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5841555A (en) * | 1993-08-31 | 1998-11-24 | Control Module Inc. | Secure optical identification method and means |
US20070022058A1 (en) * | 2002-08-08 | 2007-01-25 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
US20110264586A1 (en) * | 2010-02-11 | 2011-10-27 | Cimbal Inc. | System and method for multipath contactless transactions |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
US20120209749A1 (en) * | 2011-02-16 | 2012-08-16 | Ayman Hammad | Snap mobile payment apparatuses, methods and systems |
US20120230577A1 (en) * | 2011-03-08 | 2012-09-13 | Bank Of America Corporation | Recognizing financial document images |
US20140337175A1 (en) * | 2011-02-22 | 2014-11-13 | Visa International Service Association | Universal Electronic Payment Apparatuses, Methods and Systems |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1917621A4 (en) | 2005-07-15 | 2010-10-27 | Revolution Money Inc | System and method for user selection of fraud detection rules |
US20090254479A1 (en) | 2008-04-02 | 2009-10-08 | Pharris Dennis J | Transaction server configured to authorize payment transactions using mobile telephone devices |
US9501773B2 (en) | 2010-02-02 | 2016-11-22 | Xia Dai | Secured transaction system |
US8380177B2 (en) | 2010-04-09 | 2013-02-19 | Paydiant, Inc. | Mobile phone payment processing methods and systems |
US8924712B2 (en) * | 2011-11-14 | 2014-12-30 | Ca, Inc. | Using QR codes for authenticating users to ATMs and other secure machines for cardless transactions |
-
2012
- 2012-03-30 US US13/434,938 patent/US10453105B2/en active Active
-
2019
- 2019-09-03 US US16/558,795 patent/US20200051144A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5841555A (en) * | 1993-08-31 | 1998-11-24 | Control Module Inc. | Secure optical identification method and means |
US20070022058A1 (en) * | 2002-08-08 | 2007-01-25 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
US7784684B2 (en) * | 2002-08-08 | 2010-08-31 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
US20110264586A1 (en) * | 2010-02-11 | 2011-10-27 | Cimbal Inc. | System and method for multipath contactless transactions |
US20120209749A1 (en) * | 2011-02-16 | 2012-08-16 | Ayman Hammad | Snap mobile payment apparatuses, methods and systems |
US20140337175A1 (en) * | 2011-02-22 | 2014-11-13 | Visa International Service Association | Universal Electronic Payment Apparatuses, Methods and Systems |
US20120230577A1 (en) * | 2011-03-08 | 2012-09-13 | Bank Of America Corporation | Recognizing financial document images |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140236835A1 (en) * | 2011-09-29 | 2014-08-21 | Pacid Technologies, Llc | System and method for application security |
US20140136418A1 (en) * | 2011-09-29 | 2014-05-15 | Pacid Technologies, Llc | System and method for application security |
US20150348033A1 (en) * | 2012-12-21 | 2015-12-03 | Leon Johannes Brits | Secure Payments Using Portable Communication Devices and Two Dimensional Codes |
US20150100668A1 (en) * | 2013-10-04 | 2015-04-09 | Samsung Electronics Co., Ltd. | Method and apparatus for content verification |
US10013564B2 (en) * | 2013-10-10 | 2018-07-03 | Elwha Llc | Methods, systems, and devices for handling image capture devices and captured images |
US10289863B2 (en) | 2013-10-10 | 2019-05-14 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy beacons |
US10834290B2 (en) | 2013-10-10 | 2020-11-10 | Elwha Llc | Methods, systems, and devices for delivering image data from captured images to devices |
US9799036B2 (en) | 2013-10-10 | 2017-10-24 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy indicators |
US20150104006A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Methods, systems, and devices for handling image capture devices and captured images |
US10102543B2 (en) | 2013-10-10 | 2018-10-16 | Elwha Llc | Methods, systems, and devices for handling inserted data into captured images |
US10185841B2 (en) | 2013-10-10 | 2019-01-22 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy beacons |
US10346624B2 (en) | 2013-10-10 | 2019-07-09 | Elwha Llc | Methods, systems, and devices for obscuring entities depicted in captured images |
US10410196B1 (en) * | 2013-11-29 | 2019-09-10 | Intuit Inc. | System and method to enable payment using mark generation and mobile device |
US11321691B2 (en) | 2013-11-29 | 2022-05-03 | Intuit Inc. | System and method to enable payment using mark generation and mobile device |
EP3108425A4 (en) * | 2014-02-21 | 2017-10-18 | Visa International Service Association | System and method for transmitting and receiving transaction information |
US9558680B2 (en) | 2014-04-04 | 2017-01-31 | Sizhe Tan | Payload in picture encoding |
US11132674B2 (en) | 2015-03-04 | 2021-09-28 | Sizhe Tan | Micro trusted network |
US20210377309A1 (en) * | 2020-06-02 | 2021-12-02 | Hid Global Cid Sas | System and method for establishing secure session with online disambiguation data |
Also Published As
Publication number | Publication date |
---|---|
US20200051144A1 (en) | 2020-02-13 |
US10453105B2 (en) | 2019-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200051144A1 (en) | Encrypted payment image | |
US11868997B2 (en) | Secure payments using a mobile wallet application | |
JP5592477B2 (en) | Personal authentication system and method using mobile device | |
US20200151717A1 (en) | Event access with data field encryption for validation and access control | |
US9800408B2 (en) | Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof | |
US20140100973A1 (en) | Smartphone virtual payment card | |
CN107210918A (en) | Use the token and password of transaction-specific information | |
US20150339886A1 (en) | Encrypted electronic gaming ticket | |
CN104126292A (en) | Strong authentication token with visual output of pki signatures | |
US10395232B2 (en) | Methods for enabling mobile payments | |
AU2014342209B2 (en) | Cryptographic watermarking of content in fuel dispensing environments | |
KR20130009890A (en) | The security online payment system and those methods based on two dimensions code scanning with a device containing encrypted payment authentication information | |
TW201342118A (en) | Mobile authentication for enabling host device functions | |
US11631062B2 (en) | Voucher verification auxiliary device, voucher verification auxiliary system, and voucher verification auxiliary method | |
US20120310756A1 (en) | System and method for displaying user's signature on pos terminals | |
TWI677842B (en) | System for assisting a financial card holder in setting password for the first time and method thereof | |
JP2006243984A (en) | Authentication device built in portable terminal, authentication program for portable terminal, recording medium thereof, and authentication method using portable terminal | |
CN116192469A (en) | Security anti-theft method for electronic card transaction or transmission | |
JP2023006478A (en) | Information processing device, user terminal, user medium, authentication method, authenticated method, and computer program | |
KR20230071990A (en) | Code-based simple payment system | |
EP3116159A1 (en) | Method and apparatus for securing data transmission | |
KR20160135409A (en) | System and method for issuing electronic receipts | |
AU2014202432A1 (en) | Payment Transaction Techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BUTLER, DAVID G;SMITH, KENNETH K;ALEGRIA, ANDREW;SIGNING DATES FROM 20120327 TO 20120409;REEL/FRAME:028068/0673 |
|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001 Effective date: 20151027 |
|
AS | Assignment |
Owner name: ENT. SERVICES DEVELOPMENT CORPORATION LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP;REEL/FRAME:041041/0716 Effective date: 20161201 |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |